Prevention - centric cybersecurity
blog

BLOG

Deep Learning vs. Machine Learning

Deep learning and machine learning are both branches of artificial intelligence (AI). They involve building algorithms to analyze and make predictions or decisions based on data. However, there are...

Sales Tools vs. Actual Security: Differentiating Between Scans

  Imagine you’ve just purchased a certified used car. As part of due diligence, you take that car into another dealership for a full workup. That dealership tells you that you have $9,000...

Ransomware Prevention: A Persistent Problem Top of Mind for The City of Dallas

Ransomware continues to be a pressing cybersecurity threat, causing significant disruptions and financial losses for individuals, businesses, and municipalities. The recent 2023 Dallas ransomware...

Cybersecurity Tools: Is More Security Better Security?

Recently, we attended several industry events. Looking around the vendor halls, there were no less than 30 vendors providing cybersecurity tools. All of them presented value and hit different portions...

EvilExtractor: Awareness and Hygiene!

EvilExtractor malware extracts sensitive or confidential information from a victim’s computer system without their consent or knowledge. It falls under the category of information-stealing...

Infamous Emotet is Back in Play

Emotet, a self-updating modular trojan horse malware, has again raised its ugly head. Emotet, also known as “The Banker,” was first discovered in 2014 as a banking Trojan. However, over...